메뉴 건너뛰기




Volumn 8, Issue 8, 2009, Pages 1023-1038

PDCS: Security and privacy support for data-centric sensor networks

Author keywords

Data centric; Keyed bloom filter; Privacy; Security; Wireless sensor networks

Indexed keywords

ANALYSIS AND SIMULATION; BLOOM FILTERS; CRYPTOGRAPHIC KEY; DATA CENTRIC; EUCLIDEAN; GEOGRAPHIC LOCATION; KEY MANAGEMENT; KEYED BLOOM FILTER; MESSAGE OVERHEAD; PRIVACY; QUERY OPTIMIZATION; QUERY PRIVACY; SECURITY; SECURITY AND PRIVACY; SECURITY PROBLEMS; SENSOR DATA; TAMPER RESISTANCE;

EID: 67649494461     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2008.168     Document Type: Article
Times cited : (32)

References (58)
  • 5
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
    • B. Karp and H. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. ACM MobiCom, 2000.
    • (2000) Proc. ACM MobiCom
    • Karp, B.1    Kung, H.2
  • 6
    • 0036949025 scopus 로고    scopus 로고
    • A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks
    • Sept
    • F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks," Proc. ACM MobiCom, pp. 148-159, Sept. 2002.
    • (2002) Proc. ACM MobiCom , pp. 148-159
    • Ye, F.1    Luo, H.2    Cheng, J.3    Lu, S.4    Zhang, L.5
  • 8
    • 67649527679 scopus 로고    scopus 로고
    • The Smartdust Project, http://robotics.eecs.berkeley.edu/pister/ SmartDust/, 2008.
    • The Smartdust Project, http://robotics.eecs.berkeley.edu/pister/ SmartDust/, 2008.
  • 9
    • 0041165532 scopus 로고    scopus 로고
    • Euclidean Steiner Minimum Trees: An Improved Exact Algorithm
    • P. Winter and M. Zachariasen, "Euclidean Steiner Minimum Trees: An Improved Exact Algorithm," Networks, vol. 30, no. 3, pp. 149-166, 1997.
    • (1997) Networks , vol.30 , Issue.3 , pp. 149-166
    • Winter, P.1    Zachariasen, M.2
  • 10
    • 2342502819 scopus 로고    scopus 로고
    • Preserving Privacy in Environments with Location-Based Applications
    • G. Myles, A. Friday, and N. Davies, "Preserving Privacy in Environments with Location-Based Applications," IEEE Pervasive Computing, 2003.
    • (2003) IEEE Pervasive Computing
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 15
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Address, and Digital Pseudonyms
    • D. Chaum, "Untraceable Electronic Mail, Return Address, and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981.
    • (1981) Comm. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 17
    • 34548302064 scopus 로고    scopus 로고
    • pDCS: Security and Privacy Support for Data-Centric Sensor Networks
    • M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," Proc. IEEE INFOCOM, 2007.
    • (2007) Proc. IEEE INFOCOM
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 25
    • 33144476837 scopus 로고    scopus 로고
    • Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
    • Feb
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm., Feb. 2006.
    • (2006) IEEE J. Selected Areas in Comm
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 26
    • 25844473466 scopus 로고    scopus 로고
    • Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach
    • Mar
    • W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach," Proc. IEEE INFOCOM, Mar. 2005.
    • (2005) Proc. IEEE INFOCOM
    • Zhang, W.1    Cao, G.2
  • 27
    • 37849028668 scopus 로고    scopus 로고
    • A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Networks
    • W. Zhang, M. Tran, S. Zhu, and G. Cao, "A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Networks," Proc. ACM MobiHoc, 2007.
    • (2007) Proc. ACM MobiHoc
    • Zhang, W.1    Tran, M.2    Zhu, S.3    Cao, G.4
  • 32
    • 85116486060 scopus 로고    scopus 로고
    • Location-Aided Routing in Mobile Ad Hoc Networks
    • Y. Ko and N. Vaidya, "Location-Aided Routing in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 66-75, 1998.
    • (1998) Proc. ACM MobiCom , pp. 66-75
    • Ko, Y.1    Vaidya, N.2
  • 33
    • 1542358974 scopus 로고    scopus 로고
    • Trajectory Based Forwarding and Its Applications
    • D. Niculescu and B. Nath, "Trajectory Based Forwarding and Its Applications," Proc. ACM MobiCom, 2003.
    • (2003) Proc. ACM MobiCom
    • Niculescu, D.1    Nath, B.2
  • 34
    • 25844439422 scopus 로고    scopus 로고
    • Secure Positioning of Wireless Devices with Application to Sensor Networks
    • S. Capkun and J. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Capkun, S.1    Hubaux, J.2
  • 37
    • 0034291601 scopus 로고    scopus 로고
    • GPS-Less Low Cost Outdoor Localization for Very Small Devices
    • N. Bulusu, J. Heidemann, and D. Estrin, "GPS-Less Low Cost Outdoor Localization for Very Small Devices," IEEE Personal Comm., 2000.
    • (2000) IEEE Personal Comm
    • Bulusu, N.1    Heidemann, J.2    Estrin, D.3
  • 38
    • 33144489185 scopus 로고    scopus 로고
    • Secure and Resilient Clock Synchronization in Wireless Sensor Networks
    • K. Sun, P. Ning, and C. Wang, "Secure and Resilient Clock Synchronization in Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 395-408, 2006.
    • (2006) IEEE J. Selected Areas in Comm , vol.24 , Issue.2 , pp. 395-408
    • Sun, K.1    Ning, P.2    Wang, C.3
  • 39
    • 33749987832 scopus 로고    scopus 로고
    • Attack-Resilient Time Synchronization for Wireless Sensor Networks
    • Jan
    • H. Song, S. Zhu, and G. Cao, "Attack-Resilient Time Synchronization for Wireless Sensor Networks," Ad Hoc Networks, vol. 5, no. 1, pp. 112-125, Jan. 2007.
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 112-125
    • Song, H.1    Zhu, S.2    Cao, G.3
  • 43
    • 67649527677 scopus 로고    scopus 로고
    • Crossbow Technology Inc
    • Crossbow Technology Inc., http://www.xbow.com, 2004.
    • (2004)
  • 44
    • 51349086896 scopus 로고    scopus 로고
    • Towards Statistically Strong Source Anonymity for Sensor Networks
    • M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks," Proc. IEEE INFOCOM, 2008.
    • (2008) Proc. IEEE INFOCOM
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 49
    • 33847120377 scopus 로고    scopus 로고
    • Leap+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
    • S. Zhu, S. Setia, and S. Jajodia, "Leap+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Trans. Sensor Networks, vol. 2, 2007.
    • (2007) ACM Trans. Sensor Networks , vol.2
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 50
    • 3543100577 scopus 로고    scopus 로고
    • Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM, 2004.
    • (2004) Proc. IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 51
    • 19944369062 scopus 로고    scopus 로고
    • Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
    • T. Park and K. Shin, "Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 4, no. 3, 2005.
    • (2005) IEEE Trans. Mobile Computing , vol.4 , Issue.3
    • Park, T.1    Shin, K.2
  • 54
    • 0036948878 scopus 로고    scopus 로고
    • Minimum-Energy Broadcast in AU Wireless Networks: NP-Completeness and Distribution
    • M. Cagalj, J. Hubaux, and C. Enz, "Minimum-Energy Broadcast in AU Wireless Networks: NP-Completeness and Distribution," Proc. ACM MobiCom, 2002.
    • (2002) Proc. ACM MobiCom
    • Cagalj, M.1    Hubaux, J.2    Enz, C.3
  • 55
    • 0014814325 scopus 로고
    • Space/Time Trade-Offs in Hash Coding with Allowable Errors
    • B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, 1970.
    • (1970) Comm. ACM
    • Bloom, B.1
  • 56
    • 67649540012 scopus 로고    scopus 로고
    • The Tinydb Project
    • The Tinydb Project, http://telegraph.cs.berkeley.edu/tinydb/, 2008.
    • (2008)
  • 57
    • 0242303658 scopus 로고    scopus 로고
    • On the Complexity of Graph Tree Partition Problems
    • R. Cordone and F. Maffioli, "On the Complexity of Graph Tree Partition Problems," Discrete Applied Math., vol. 134, nos. 1-3, pp. 51-65, 2004.
    • (2004) Discrete Applied Math , vol.134 , Issue.1-3 , pp. 51-65
    • Cordone, R.1    Maffioli, F.2
  • 58
    • 67649561827 scopus 로고    scopus 로고
    • July
    • Weidai's Crypto++, http://www.eskimo.com/weidai/benchmarks.html, July 2005.
    • (2005) Weidai's Crypto


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.